Glyn sez, "The Anti Counterfeiting Trade Agreement [ed: a secret, non-UN treaty that rich countries are cooking up that will criminalize copyright infringement, sending non-commercial file-sharers to prison; authorize border guards to search your hard-drive and personal electronics for copyright infringements; and require governments to give media giants the power to decide who should and shouldn't have Internet access, without having to prove anything in a court of law] has been making its way in secret for some time, a coalition of consumer groups have now demanded that the text of the directive be made public.
The resolution calls for a halt to the plurilateral negotiation of an Anti-Counterfeiting Trade Agreement (ACTA) led by the United States, until the negotiating texts are made available to consumer groups and other conditions are met.
EU, US Consumer Groups Issue Resolution On Enforcement; Demand Role In ACTA
TACD wants future negotiations to be respectful of civil liberties such as the right to privacy and also demands the inclusion of developing countries in ACTA negotiations as the stated intention is to extend and apply the treaty to them. The resolution offers recommendations to ensure IP enforcement policies and practices address issues such as transparency, evidence and process, competitiveness, consumer protection, human rights, access to knowledge, and digital rights.
The resolution reflects discussions TACD had with representatives from the EU and the US government on 9 June, during the TACD 10th annual meeting in Brussels (IPW, Enforcement, 11 June 2009). But the resolution was released for the first time on 18 June and forms part of a larger effort by TACD to push back on the IP rights enforcement issues, according to consumer representatives.
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Motherboard says a source told them that “an Apple representative, staffer, or lobbyist will testify” against the state’s Right to Repair bill, which requires companies to make it easy for their customers to choose from a variety of repair options, from official channels to third parties to DIY.
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]
Instead of throwing out all the empties after your next party, why not transform them into some new DIY glassware? Cut back on waste and add some home ambiance with the Kinkajou Bottle Cutter and Candle Making Kit.The Kinkajou is designed as a clamp-on scoring blade to make precise cuts. Just slide a bottle in, tighten […]